A system, method and computer program product are provided for detecting attacks on a network. Initially, data is received from a remote source which is destined for a target. A portion of such data is then discarded based on a predetermined set of rules utilizing a firewall which is coupled to the remote source. Remaining data is subsequently passed to an intrusion detection system coupled between the firewall and the target. Such data is parsed to identify data representing text (i.e. ASCII or UNICODE text) therein utilizing the intrusion detection system. Thereafter, the data representing text- is compared to a predetermined list of data representing text-associated with attacks utilizing the intrusion detection system. Based on the comparison, some of the data representing text are marked as hostile. The data representing text-that are marked as hostile are then acted upon in order to prevent an attack.

 
Web www.patentalert.com

< Vehicle control system and method

< System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment

> Open transmission line intrusion detection system using frequency spectrum analysis

> Hood intrusion and loss of AC power detection with automatic time stamp

~ 00058